A vulnerability in the web-based contract management service interface Ebiz4u of INOGARD could allow an victim user to download any file. The attacker is able to use startup menu directory via directory traversal for automatic execution. The victim user need to reboot, however.
References
Link | Resource |
---|---|
https://www.boho.or.kr/krcert/secNoticeView.do?bulletin_writing_sequence=35559 | Third Party Advisory |
https://www.boho.or.kr/krcert/secNoticeView.do?bulletin_writing_sequence=35559 | Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 05:37
Type | Values Removed | Values Added |
---|---|---|
References | () https://www.boho.or.kr/krcert/secNoticeView.do?bulletin_writing_sequence=35559 - Third Party Advisory |
Information
Published : 2020-08-24 15:15
Updated : 2024-11-21 05:37
NVD link : CVE-2020-7831
Mitre link : CVE-2020-7831
CVE.ORG link : CVE-2020-7831
JSON object : View
Products Affected
microsoft
- windows
inogard
- ebiz4u
CWE
CWE-494
Download of Code Without Integrity Check